Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2023, 22:21

General

  • Target

    1.msi

  • Size

    680KB

  • MD5

    3035101d044a4425dbd5a523ace428c3

  • SHA1

    f08ecf54bb93077fc32cef5f6915ce569e38bed1

  • SHA256

    f4de4f89d51790fbcc5e69d1daec304ac0433179973bfcb1828c8691a0dc5e84

  • SHA512

    d60db29c92f219c9f69debc1ad1c50cf74b858c2e9e2bd4ed00f2bb6e1e9c8bbf7e9240ec11cc7e46cafc2a0651a462f2c6c1c42824b913bedf747a1b1dae9d0

  • SSDEEP

    12288:z6hgTBOyy3AhX+JP4OduQDNZ4hxUxBjcyHnUaK6BpefgRY1bHzv7F/EfO:W+dIu+zduQDD4hxUYy0Z6B4flbHLtEW

Score
10/10

Malware Config

Signatures

  • Detect rhadamanthys stealer shellcode 7 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2596
      • C:\Windows\system32\msiexec.exe
        msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\1.msi
        2⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4884
      • C:\Windows\system32\certreq.exe
        "C:\Windows\system32\certreq.exe"
        2⤵
          PID:4248
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:808
        • C:\Windows\system32\srtasks.exe
          C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
          2⤵
            PID:4152
          • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe
            "C:\Users\Admin\AppData\Local\Software Installer\Setup.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3468
            • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe
              "C:\Users\Admin\AppData\Local\Software Installer\Setup.exe"
              3⤵
              • Executes dropped EXE
              PID:4464
            • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe
              "C:\Users\Admin\AppData\Local\Software Installer\Setup.exe"
              3⤵
              • Executes dropped EXE
              PID:4948
            • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe
              "C:\Users\Admin\AppData\Local\Software Installer\Setup.exe"
              3⤵
              • Suspicious use of NtCreateUserProcessOtherParentProcess
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4084
        • C:\Windows\system32\vssvc.exe
          C:\Windows\system32\vssvc.exe
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2492

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Config.Msi\e57f02d.rbs

          Filesize

          8KB

          MD5

          7b1104e1c6231baff86b4715dc52628b

          SHA1

          19d24519608465b1c085df41f9b77a638ff73393

          SHA256

          2f73ebb631b1e3b4c383330b323d09c23540ad9cb7ede0c0ec16cc67865e3e96

          SHA512

          ae2b754983808c9686ad86a2b6078aa7d01f5b7ce56dc3253bd408e1782011ee84ea8e2b7bb012ff40749e7468ee0db306d290b8c8863f1e347b79c3dc529da6

        • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe

          Filesize

          371KB

          MD5

          2cfed8e9b117e80c7645c40e6dc0abc9

          SHA1

          cea302664bdd9f01473ca25d0863f926a74bca42

          SHA256

          260bac5419a77db5138a3da5140e86c679d001baccbcde4b626c139ee2c4e0ee

          SHA512

          88a21294d04284bd09a0237edc1df95c086dc5c19bcbfe0e4c4ebce030634ee0946f41eeb3e6a7ab7caf07eb863aff5b61de5440c1ab512a36ecf85323b302d1

        • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe

          Filesize

          371KB

          MD5

          2cfed8e9b117e80c7645c40e6dc0abc9

          SHA1

          cea302664bdd9f01473ca25d0863f926a74bca42

          SHA256

          260bac5419a77db5138a3da5140e86c679d001baccbcde4b626c139ee2c4e0ee

          SHA512

          88a21294d04284bd09a0237edc1df95c086dc5c19bcbfe0e4c4ebce030634ee0946f41eeb3e6a7ab7caf07eb863aff5b61de5440c1ab512a36ecf85323b302d1

        • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe

          Filesize

          371KB

          MD5

          2cfed8e9b117e80c7645c40e6dc0abc9

          SHA1

          cea302664bdd9f01473ca25d0863f926a74bca42

          SHA256

          260bac5419a77db5138a3da5140e86c679d001baccbcde4b626c139ee2c4e0ee

          SHA512

          88a21294d04284bd09a0237edc1df95c086dc5c19bcbfe0e4c4ebce030634ee0946f41eeb3e6a7ab7caf07eb863aff5b61de5440c1ab512a36ecf85323b302d1

        • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe

          Filesize

          371KB

          MD5

          2cfed8e9b117e80c7645c40e6dc0abc9

          SHA1

          cea302664bdd9f01473ca25d0863f926a74bca42

          SHA256

          260bac5419a77db5138a3da5140e86c679d001baccbcde4b626c139ee2c4e0ee

          SHA512

          88a21294d04284bd09a0237edc1df95c086dc5c19bcbfe0e4c4ebce030634ee0946f41eeb3e6a7ab7caf07eb863aff5b61de5440c1ab512a36ecf85323b302d1

        • C:\Users\Admin\AppData\Local\Software Installer\Setup.exe

          Filesize

          371KB

          MD5

          2cfed8e9b117e80c7645c40e6dc0abc9

          SHA1

          cea302664bdd9f01473ca25d0863f926a74bca42

          SHA256

          260bac5419a77db5138a3da5140e86c679d001baccbcde4b626c139ee2c4e0ee

          SHA512

          88a21294d04284bd09a0237edc1df95c086dc5c19bcbfe0e4c4ebce030634ee0946f41eeb3e6a7ab7caf07eb863aff5b61de5440c1ab512a36ecf85323b302d1

        • C:\Users\Admin\AppData\Local\Software Installer\setup1.bin

          Filesize

          456KB

          MD5

          63917716c9c06309ad732c1e03a8810b

          SHA1

          34f770380fa79a8069d50f8a38bb49d40fb8c67d

          SHA256

          8819b5ddee35390103144f90d75523b6678be9f9803dfd633e7c15116afe0bec

          SHA512

          f13c915a1e937530667bef73edd5e47470cc5453d42fcfed5917f3defc417b835f043fcffcd2866b9af04446c77b152b5f3dc74afa88c43e070955678c64ab24

        • C:\Windows\Installer\e57f02c.msi

          Filesize

          680KB

          MD5

          3035101d044a4425dbd5a523ace428c3

          SHA1

          f08ecf54bb93077fc32cef5f6915ce569e38bed1

          SHA256

          f4de4f89d51790fbcc5e69d1daec304ac0433179973bfcb1828c8691a0dc5e84

          SHA512

          d60db29c92f219c9f69debc1ad1c50cf74b858c2e9e2bd4ed00f2bb6e1e9c8bbf7e9240ec11cc7e46cafc2a0651a462f2c6c1c42824b913bedf747a1b1dae9d0

        • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

          Filesize

          23.0MB

          MD5

          ce7e8a7b4590387d359da91cdb832bcc

          SHA1

          8ae26a055691fc56714d864cc8599bc76bc9709a

          SHA256

          451b79b68c107bda209a75200cbe2bba5c93ea66141941e90e48ec5a8875e9da

          SHA512

          9dd189bbd2f3505e8f142ea277b4b530b1e59d99ad47db1e57b2c2654e24014e16289c48e8dfe62e2cf5940777d064ad3c192c4c80234da0329aa29b99c56e65

        • \??\Volume{1f21c27e-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{91e34e14-28a2-43eb-ae33-d8523d10a9ad}_OnDiskSnapshotProp

          Filesize

          5KB

          MD5

          f5007ae3d1ca38b76415678fc8f37870

          SHA1

          be47a7da3e36249049b36ad1d905715645dccea7

          SHA256

          743e36e9a7592fb0f21c73fcf31d7ba5a2f5e513149d047272c68a66e9fa06f4

          SHA512

          1c0ec8f43f4ab9328f07aca90c4c4ce4f42736bb0e147be1d5a2cfbc3309e2783a2292de2059d0ad7668204cba2963c5450a39e165acd09de543eb959fe55be1

        • memory/4084-168-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-162-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/4084-166-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/4084-170-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-169-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-171-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-165-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/4084-167-0x0000000000DE0000-0x0000000000DE7000-memory.dmp

          Filesize

          28KB

        • memory/4084-189-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-175-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/4084-176-0x0000000003730000-0x0000000003766000-memory.dmp

          Filesize

          216KB

        • memory/4084-182-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-186-0x0000000003730000-0x0000000003766000-memory.dmp

          Filesize

          216KB

        • memory/4084-187-0x0000000002890000-0x0000000002C90000-memory.dmp

          Filesize

          4.0MB

        • memory/4084-188-0x0000000000400000-0x0000000000473000-memory.dmp

          Filesize

          460KB

        • memory/4248-174-0x000001DE96940000-0x000001DE96943000-memory.dmp

          Filesize

          12KB